From: David Gibson <david@gibson.dropbear.id.au>
To: Christoph Hellwig <hch@lst.de>
Cc: Jens Axboe <axboe@kernel.dk>,
linux-kernel@vger.kernel.org, Nick Piggin <npiggin@gmail.com>,
Michael Ellerman <michael@ellerman.id.au>,
Paul Mackerras <paulus@samba.org>,
linuxppc-dev@lists.ozlabs.org
Subject: powerpc hugepage leak caused by 576ed913 "block: use bio_add_page in bio_iov_iter_get_pages"
Date: Tue, 23 Apr 2019 15:41:31 +1000 [thread overview]
Message-ID: <20190423054131.GB31496@umbus.fritz.box> (raw)
[-- Attachment #1: Type: text/plain, Size: 2195 bytes --]
576ed913 "block: use bio_add_page in bio_iov_iter_get_pages", applied
late in the 4.19 cycle appears to introduce a regression causing a
huge page leak in a complicated set of circumstances I haven't fully
identified yet.
On a POWER8 machine with a kernel after the commit above, when I run a
KVM guest with RAM in hugetlbfs pages (and certain options, see below), a
handful of the hugepages used for RAM are not released after qemu and
the guest quit. Usually 2 or 3 16MiB pages are leaked, though I've
seen anything from 0-8 occasionally.
There are a bunch of conditions on when it occurs, only some of which
I've pinned down:
* It happens on a POWER8 8247-22L, but not a very similar 8247-21L,
and I haven't been able to work out why, yet.
* It only happens with certain combination of qemu block and caching
options for the guest's root fs. Specifically it appears to happen
when the file used for the guest's root disk image is opened with
O_DIRECT.
* It depends somewhat on guest activity.
- It doesn't occur if the guest is only booted to firmware
- Booting only to initramfs without mounting the "real" root fs
doesn't seem to trigger the problem
- It appears to happen reliably with RHEL6 and RHEL7 guests, but
only sometimes with RHEL8 guests, again, I don't know why at
this stage
I pinned it down to this (host kernel) patch by bisection, and I've
double checked afterwards to confirm it really is this commit, not a
mistake during the bisection.
I've tried a bunch of instrumentation, but it hasn't been very
illuminating so far:
* The leaked pages have non-zero count and are left in the
hugepage_activelist
* The leaked pages *don't* appear to be blocking release of the KVM
VM or the qemu process owning it
* The leaked pages *do* appear to be blocking release of the
associated address_space and (anonymous) inode, though I'm not 100%
certain about this.
--
David Gibson | I'll have my music baroque, and my code
david AT gibson.dropbear.id.au | minimalist, thank you. NOT _the_ _other_
| _way_ _around_!
http://www.ozlabs.org/~dgibson
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 833 bytes --]
next reply other threads:[~2019-04-23 7:56 UTC|newest]
Thread overview: 6+ messages / expand[flat|nested] mbox.gz Atom feed top
2019-04-23 5:41 David Gibson [this message]
2019-04-25 6:19 ` powerpc hugepage leak caused by 576ed913 "block: use bio_add_page in bio_iov_iter_get_pages" Christoph Hellwig
2019-04-26 1:05 ` David Gibson
2019-04-26 3:56 ` David Gibson
2019-04-26 10:51 ` Ming Lei
2019-06-08 16:51 ` Ming Lei
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20190423054131.GB31496@umbus.fritz.box \
--to=david@gibson.dropbear.id.au \
--cc=axboe@kernel.dk \
--cc=hch@lst.de \
--cc=linux-kernel@vger.kernel.org \
--cc=linuxppc-dev@lists.ozlabs.org \
--cc=michael@ellerman.id.au \
--cc=npiggin@gmail.com \
--cc=paulus@samba.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).